Kerneloops

Note: Executable of this report does not come from a package.
Similar reports
Problem #640641
Component
kernel Tainted
Last affected version
N/A
Executable
unknown
First occurrence
2021-06-29
Last occurrence
2021-06-29
Unique reports
1
Quality
-57

Statistics

Operating system Unique / Total count
Fedora 34 1 / 166
Architecture Count
x86_64 166

History

Daily:

Weekly:

Monthly:

No reports in the last 20 days.

No reports in the last 20 weeks.

No reports in the last 20 months.


Backtrace

Frame # Function Binary Source or offset Line
1
_raw_spin_lock_irq
vmlinux 0x21
2
? _raw_spin_lock_irq
vmlinux 0x21
3
_raw_spin_lock_irq
vmlinux 0x21
4
_raw_spin_lock_irq
vmlinux 0x21
5
_raw_spin_lock_irq
vmlinux 0x21
6
? _raw_spin_lock_irq
vmlinux 0x21
7
_raw_spin_lock_irq
vmlinux 0x21
8
_raw_spin_lock_irq
vmlinux 0x21
9
_raw_spin_lock_irq
vmlinux 0x21
10
_raw_spin_lock_irq
vmlinux 0x21
11
? _raw_spin_lock_irq
vmlinux 0x21
12
_raw_spin_lock_irq
vmlinux 0x21
13
_raw_spin_lock_irq
vmlinux 0x21
14
? _raw_spin_lock_irq
vmlinux 0x21
15
? _raw_spin_lock_irq
vmlinux 0x21
16
? _raw_spin_lock_irq
vmlinux 0x21
17
_raw_spin_lock_irq
vmlinux 0x21
18
_raw_spin_lock_irq
vmlinux 0x21
19
? _raw_spin_lock_irq
vmlinux 0x21
20
? _raw_spin_lock_irq
vmlinux 0x21
21
? _raw_spin_lock_irq
vmlinux 0x21
22
_raw_spin_lock_irq
vmlinux 0x21
23
_raw_spin_lock_irq
vmlinux 0x21
general protection fault, probably for non-canonical address 0x9f265be4592a3509: 0000 [#2] SMP NOPTI
CPU: 9 PID: 587 Comm: fedora-dmraid-a Tainted: G      D W         5.11.12-300.fc34.x86_64 #1
Hardware name: Micro-Star International Co., Ltd MS-7B86/B450 GAMING PLUS (MS-7B86), BIOS 1.B2 08/19/2019
RIP: 0010:kmem_cache_alloc+0x79/0x1e0
Code: e2 d1 76 49 8b 00 49 83 78 10 00 48 89 04 24 0f 84 5e 01 00 00 48 85 c0 0f 84 55 01 00 00 41 8b 4c 24 28 49 8b 3c 24 48 01 c1 <48> 8b 19 48 89 ce 49 33 9c 24 b8 00 00 00 48 0f ce 48 31 f3 40 f6
RSP: 0018:ffffba14805bfa28 EFLAGS: 00010286
RAX: 9f265be4592a34e1 RBX: 000000000000003d RCX: 9f265be4592a3509
RDX: 0000000000000014 RSI: 0000000000000900 RDI: 0000000000030470
RBP: 0000000000000900 R08: ffff98610ea70470 R09: 0000000002000000
R10: 0000000000000001 R11: 00000000ffffffff R12: ffff985e00047200
R13: ffffffff89551c97 R14: ffff985e00047200 R15: 0000000000000001
FS:  00007f97e9ef1740(0000) GS:ffff98610ea40000(0000) knlGS:0000000000000000
CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033
CR2: 000055bbe6fafd40 CR3: 000000010e2b8000 CR4: 0000000000350ee0
Call Trace:
 avc_alloc_node+0x27/0x190
 ? security_compute_av+0x12d/0x280
 avc_compute_av.isra.0+0x95/0x1e0
 avc_has_perm_flags+0xc7/0x180
 selinux_inode_follow_link+0x94/0xb0
 ? current_time+0x1b/0xd0
 security_inode_follow_link+0x37/0x50
 step_into+0x201/0x6d0
 walk_component+0x62/0x190
 link_path_walk.part.0.constprop.0+0x20d/0x350
 ? path_init+0x2bd/0x3e0
 path_lookupat+0x3a/0x1b0
 filename_lookup+0x9b/0x180
 ? strncpy_from_user+0x81/0x190
 ? getname_flags.part.0+0x48/0x1b0
 ? user_path_at_empty+0x3f/0x80
 vfs_statx+0x64/0x100
 __do_sys_newfstatat+0x1e/0x40
 ? do_user_addr_fault+0x1b3/0x480
 ? __audit_syscall_exit+0x24d/0x2a0
 ? syscall_trace_enter.constprop.0+0x140/0x1b0
 do_syscall_64+0x33/0x40
 entry_SYSCALL_64_after_hwframe+0x44/0xa9
RIP: 0033:0x7f97e9fe4c2e
Code: 48 89 f2 b9 00 01 00 00 48 89 fe bf 9c ff ff ff e9 07 00 00 00 0f 1f 80 00 00 00 00 f3 0f 1e fa 41 89 ca b8 06 01 00 00 0f 05 <3d> 00 f0 ff ff 77 0b 31 c0 c3 0f 1f 84 00 00 00 00 00 48 8b 15 09
RSP: 002b:00007ffc0e45dfd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000106
RAX: ffffffffffffffda RBX: 0000000000000024 RCX: 00007f97e9fe4c2e
RDX: 00007ffc0e45dfe0 RSI: 000055bbe77cd500 RDI: 00000000ffffff9c
RBP: 000055bbe77cd500 R08: 000055bbe77cd500 R09: 00007f97ea0b7a60
R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000
R13: 000055bbe77bddc0 R14: 000055bbe77bddc0 R15: 000055bbe77c5700
Modules linked in: zram ip_tables nouveau video mxm_wmi i2c_algo_bit drm_ttm_helper ttm drm_kms_helper cec crct10dif_pclmul crc32_pclmul crc32c_intel drm ghash_clmulni_intel ccp r8169 wmi pinctrl_amd fuse